Call us at 507.319.5206 or This email address is being protected from spambots. You need JavaScript enabled to view it.
Follow us on LinkedIn and Twitter

Botz Security Bytes Newsletter — October 2015



Solving information security problems                            October 2015

Home     |      SSO Services      |      Security Consulting      |       Downloads     |      Contact      


Planning Security Budgets for 2016


2016 BudgetingOctober 12, 2015 — It's that time of year again! 


Budgeting for next year means that you need to figure out how much you’re going to spend on security projects and products.


Of course, in order to determine how much money you need to spend, you first have to figure out which security projects and products you need.


So how do you do that?




I Didn't See That One Coming!



One of the things I like best about my job is that I get to see a lot of different environments using many different parts of the operating system. This often gives me the opportunity to learn something new.


Recently, I was helping a customer implement SSO.


After getting everything set up, we started testing.


Everything worked.....but Telnet. Hmmmm.....






Not your copy? 

Don't miss an issue!  Subscribe here...



Join us for the live webinar Planning Your 2016 IBM i Security Budget to learn how to organize your thought processes– as well as the questions you need to ask – to effectively allocate budget dollars for IBM i security.
Register here....




Researchers Warn Against Continuing Use Of SHA-1 Crypto Standard
We thought it would be 2 or more years before known weaknesses in this popular hashing algorithm would become an economical target for crime organizations. However, researchers developed a new method that would cost only about $100,000 to execute. SHA-1 has been used for digital certificate signing for years. Time to upgrade.  


Experian Breach Affects 15 Million Consumers
This one hit close to home. The social security numbers and other data of 15 million people who applied for financing with T-Mobile between 9/1/13 and 9/1/15 were exposed in a recent breach. I am a T-Mobile customer. I got a new phone about 6 months ago. The phone is financed.


Visa Introduces EMV Chip-based Biometrics
Visa's new specification for biometrics with chip card transactions can use palm, voice, iris or facial biometrics.


BOTZ & Associates, Inc.    |    Rochester, MN 55903    |    1.507.319.5206    |    This email address is being protected from spambots. You need JavaScript enabled to view it.